Automatic authentication of backup clients
First Claim
1. A method of automatically authenticating a client computer in a backup process, comprising:
- obtaining by a backup computer first information from the client computer;
determining from the first information whether the client computer is included in a backup database for backup by the backup computer;
upon determining that the client computer is not included in the database, requesting from the client computer second information encrypted using one of a plurality a public keys of the client computer;
decrypting the encrypted second information using a private key of the backup computer;
determining whether the decrypted second information includes expected information; and
adding the client computer to the backup database for backup upon the decrypted second information containing said expected information.
9 Assignments
0 Petitions
Accused Products
Abstract
A method of automatically authenticating clients on a computer system network enables clients on the network to be automatically logged in and added to a backup database and assigned for backup. The method employs a public key/private key encryption system in which clients have a public key and the backup server has a private key. The backup server interrogates new clients to determine client status and whether the client supports the public key/private key certificate. If it does, the backup server uses key values from the client decrypted using its private key to generate encryption keys which are employed in an algorithm for securely communicating with the client to log the client into a backup database. Otherwise, the backup server uses a password entered by a user in the client for generating the encryption keys. Additionally, the method enables backup software and public keys to be automatically push installed on the clients.
47 Citations
20 Claims
-
1. A method of automatically authenticating a client computer in a backup process, comprising:
-
obtaining by a backup computer first information from the client computer;
determining from the first information whether the client computer is included in a backup database for backup by the backup computer;
upon determining that the client computer is not included in the database, requesting from the client computer second information encrypted using one of a plurality a public keys of the client computer;
decrypting the encrypted second information using a private key of the backup computer;
determining whether the decrypted second information includes expected information; and
adding the client computer to the backup database for backup upon the decrypted second information containing said expected information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. Computer readable media comprising instructions executed by a computer system to perform a method for authenticating a client computer for backup by a backup computer, the method comprising:
-
obtaining first information from the client computer;
determining from the first information whether the client computer is included in a backup database;
upon determining that the client computer is not included in the database, requesting from the client computer second information encrypted using one of a plurality of public keys of the client computer;
decrypting the encrypted second information using a private key of the backup computer;
determining whether the decrypted second information includes expected information; and
adding the client computer to the backup database for backup upon the decrypted second information containing said expected information. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A system for automatically authenticating a client computer for backup, comprising a backup computer;
- a backup database storing identities of computers for backup; and
computer readable media comprising computer program code instructions executable by the backup computer for controlling the operation the backup computer, the instructions controlling the backup computer to receive first information from the client computer and determine whether the client computer is included in the backup database;
upon determining that the client computer is not included in the database, to receive second information from the client computer encrypted using one of a plurality of public keys in the client computer;
to decrypt said second information using a private key in said backup computer; and
, upon the decrypted second information containing expected information, to add the client computer to the backup database. - View Dependent Claims (19, 20)
- a backup database storing identities of computers for backup; and
Specification